Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe
Resource
win10v2004-20221111-en
General
-
Target
3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe
-
Size
522KB
-
MD5
4b50e15af56d4eef787582fefc29812f
-
SHA1
77b132656c6a77c5089edda3ded85f4fffe2f4ce
-
SHA256
3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca
-
SHA512
fdf8b97ce50837d9c489c27fd898caff191446bbc152b6b67487248f218a116495e52ace97e592ac423a0b19c80ec69f9f7783ecea233cdffb7d8dd2bd79b405
-
SSDEEP
12288:sioV+4I/ZY8ScxS7CDpwtWsjYO9AtwRH:sVVx+qcYOCrkO9qwB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exedescription pid process target process PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1028 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe PID 1668 wrote to memory of 1640 1668 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe 3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe"C:\Users\Admin\AppData\Local\Temp\3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exewatch2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\3dd2245254bd918d97dee6d8ce175715cf9a8e66b14cd81df74c9e7b5181bcca.exestart2⤵PID:1028
-